Security StrategiesThis newsletter is sponsored by CredantNetwork World's Security Strategies Newsletter, 10/11/07Password management: Facing the problemBy M. E. KabayIn my last two columns, I’ve been looking at the pervasive problems we have in the security field in overcoming natural human tendencies to misjudge risk. In particular, I’ve pointed out that the well-known and documented tendency of normal people to write down passwords is a consequence of deep-seated difficulties we face in our in-built abilities to interpret and manage risk. When I was reconnecting recently with an old friend from my NCSA (National Computer Security Association) days in the 1990s, I visited her employer’s Web site and found an interesting method for helping users avoid writing down their passwords (or choosing bad ones or even sharing them casually): Passfaces. This software allows users to pick out recognizable faces that will authenticate them to their systems. Perhaps the best introduction is to look at the “Online User Manual” posted about the free “Passfaces Personal” product that anyone can download and try.
The basic idea is that a user sets up an array of photographs and puts some familiar ones into the pool to use as keys - the faces of people the user recognizes - then the software can produce a 3-by-3 grid of random selections, including one of the key pictures. The user picks out the familiar picture and then repeats the exercise twice more with new sets of eight strangers and one friend to authenticate the user. Versions are available for Windows, for Web-site access control and for financial applications. Passfaces offers a number of useful case studies and good PDF brochures about its products. I especially liked their white paper on “The Science Behind Passfaces,” which explains how human beings are particularly good at recognizing faces; indeed, it seems that we have special circuits that have evolved for rapid and accurate perception of faces. The paper cites the following as advantages of “using Passfaces over passwords” (quoting the list exactly): * Can’t be written down or copied The power of the system is enhanced by setting parameters to interfere with misuse of the faces. For example: “In some high-security applications the grids of faces may be displayed only for a very short time. A half second is long enough for practiced users to recognize their Passfaces. Combined with masking (faces in a grid are overwritten with a common mask face) it is extremely difficult for “shoulder surfers” to learn the Passfaces as the user clicks on them. Users can also be given the option to enter the grid position of each Passfaces on a keypad, rather than picking them out on the screen.” Worth a glance, eh? [As always, I assure readers that I make any relationships to a vendor clear when I write about their product. I had never heard of Passfaces before I stumbled upon their Web site and have no financial interest at all in their product, although I think it’s pretty neat.] Editor's Note: See more on password alternatives here. Plus, see how Passfaces is being used at a healthcare company.
|
| Contact the author: M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. This newsletter is sponsored by CredantARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment